Try it for yourself; free
demo and trial available
“We’re honored that the judges at 2014
Reveal Attacks Hidden within Your Global Network
The Pravail Security Analytics platform takes network packet captures from anywhere in the network, not just where customers already have security enforcement, delivering an unprecedented view of security across all network data. This allows customers to see attacks on their global network faster and in more detail than ever before. Powerful visualizations display the data from multiple perspectives (attacker, target, location or attack type) enabling the analyst to quickly compare attack statistics from different periods or locations, over years or terabytes of traffic. Once an indicator of compromise has been identified, Pravail Security Analytics provides the analyst with actionable intelligence, allowing confirmation of the exact details and extent of the attack.
Further, Pravail Security Analytics provides a look back in time, re-evaluating existing data with new attack information to ensure a complete picture of compromise. For example, now that the Heartbleed vulnerability has been identified, and protections have been updated, Pravail Security Analytics can loop old traffic to establish the attack timeline. These capabilities are all the more important as incident response and security operations teams are increasingly asked to quickly and accurately make calls as to when and how a network or key data has been breached, and what response and steps the organization needs to take next.
“Pravail Security Analytics has broken new ground in security analytics functionality. The ability to replay captured traffic (looping) through an updated engine provides retroactive forensics that takes advantage of new intelligence as it becomes available. That, and the enhanced graphical data mining capability sets Arbor’s Pravail Security Analytics apart,” said IT Harvest founder
Rapid Deployment, On-Premise or In the Cloud
Pravail Security Analytics uses big data technologies that lower the barrier to entry for organizations looking to deploy and operate world-class security analytics. An organization can securely upload packet captures to Pravail Security Analytics in the Cloud and be analyzing their data within minutes of a threat being identified. For organizations that cannot upload their packet captures for compliance or regulatory reasons, Pravail Security Analytics can also be deployed as an on-premise solution using distributed Collector appliances. The Collector appliances can be used to scale out storage or processing capabilities for high speed capture points, or for deployment into multiple locations to provide distributed coverage. Most importantly, the Collector appliances operate in real-time, streaming the security analytics data to the Controller for analysis with virtually no delay. This means security analysts can track attacks live, as they happen, or perform post hoc analysis with stored and uploaded packet captures.
By using Controllers and Collectors, Pravail Security Analytics can support three flexible deployment architectures:
The technology in the Collectors can scale to meet network speeds, length of packet capture retention (for looping) and real-time processing speed. This means that full real-time functionality of Pravail Security Analytics is available for network speeds in excess of 10Gbps. Big Data Security Analytics on a grand scale. Collectors are available in multiple physical appliance form factors as well as Virtual Machines.
About Arbor Networks
To learn more about Arbor products and services, please visit our website at arbornetworks.com. Arbor’s research, analysis and insight, together with data from the ATLAS global threat intelligence system, can be found at the ATLAS Threat Portal.
Trademark Notice: Arbor Networks, Peakflow, ArbOS, How Networks Grow, ATLAS, Pravail, Arbor Optima, Cloud Signaling, the Arbor Networks logo and Arbor Networks: Smart. Available. Secure. are all trademarks of